meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, August 22nd, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 22 August 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SystemBC Scans; Exchange SU Rerelease; Ivanti Exploit; DUO Outages; mTLS vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, August 22nd, 2023 edition of the Sandton and Storm Thunder's Stormcast.

0:07.9

My name is Johannes Ulrich.

0:09.6

And today I'm recording from Jacksonville, Florida.

0:14.0

Guy in his honeypot did notice a marked increase in requests for SystemBC.

0:22.2

System BC is actually a malware.

0:24.6

It's a remote access trojan that turned systems into proxy.

0:30.4

And starting a few days ago, it looks like we had a marked increase in scans for a URL

0:36.2

related to SystemBC, systemBC slash password.

0:40.6

Php.

0:41.9

Turning systems into proxies and building basically infrastructure out of compromise systems

0:47.3

is certainly not new.

0:49.4

What may be happening here, and that's sort of why we see these scans in our honeypots is that other

0:55.7

attackers are essentially sort of looking for open proxies that they can take over, so more

1:02.3

or less parasitic scans. There's also currently AT&T reporting about a large proxy network that they're seeing.

1:12.1

They're calling it proxy nation.

1:14.3

I don't think the two events are really related.

1:18.8

In their case, Mac and Windows systems apparently are being recruited here to be part of

1:25.0

the proxy botnet.

1:27.2

And they state that something like 400,000

1:29.7

systems have already been connected to this particular proxy botnet. In some cases, even more

1:37.7

advanced adversaries have been taking advantage of proxies, micro-tick devices, for example,

1:48.3

were compromised. While they widely gone and later used for some more sophisticated attacks. And remember about a week ago on August 8, Microsoft

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.